CVE-2024-22196: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Nginx-UI is an online statistics for Server Indicators Monitor CPU usage, memory usage, load average, and disk usage in real-time. This issue may lead to information disclosure. By using DefaultQuery
, the "desc"
and "id"
values are used as default values if the query parameters are not set. Thus, the order
and sort_by
query parameter are user-controlled and are being appended to the order
variable without any sanitization. This issue has been patched in version 2.0.0.beta.9.
References
- github.com/0xJacky/nginx-ui/commit/ec93ab05a3ecbb6bcf464d9dca48d74452df8a5b
- github.com/0xJacky/nginx-ui/security/advisories/GHSA-h374-mm57-879c
- github.com/0xjacky/nginx-ui/blob/04bf8ec487f06ab17a9fb7f34a28766e5f53885e/model/model.go
- github.com/0xjacky/nginx-ui/blob/04bf8ec487f06ab17a9fb7f34a28766e5f53885e/model/model.go
- github.com/0xjacky/nginx-ui/blob/04bf8ec487f06ab17a9fb7f34a28766e5f53885e/model/model.go
- github.com/advisories/GHSA-h374-mm57-879c
- nvd.nist.gov/vuln/detail/CVE-2024-22196
Detect and mitigate CVE-2024-22196 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →